HP Tc4400 Reference Guide - Page 28

Embedded Security for ProtectTools, Basic Concepts

Page 28 highlights

3 Embedded Security for ProtectTools Basic Concepts ✎ The integrated Trusted Platform Module (TPM) embedded security chip must be installed in your computer to use Embedded Security for ProtectTools. Embedded Security for ProtectTools protects against unauthorized access to user data or credentials. This software module provides the following security features: ■ Enhanced Microsoft Encryption File System (EFS) file and folder encryption ■ Creation of a personal secure drive (PSD) for protecting user data ■ Data management functions, such as backing up and restoring the key hierarchy ■ Support for third-party applications (such as Microsoft Outlook and Internet Explorer) for protected digital certificate operations when using the Embedded Security software Reference Guide 3-1

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86

Reference Guide
3–1
3
Embedded Security for
ProtectTools
Basic Concepts
The integrated Trusted Platform Module (TPM) embedded
security chip must be installed in your computer to use
Embedded Security for ProtectTools.
Embedded Security for ProtectTools
protects against
unauthorized access to user data or credentials. This software
module provides the following security features:
Enhanced Microsoft Encryption File System (EFS) file
and folder encryption
Creation of a personal secure drive (PSD) for protecting
user data
Data management functions, such as backing up and
restoring the key hierarchy
Support for third-party applications (such as
Microsoft Outlook and Internet Explorer) for protected
digital certificate operations when using the Embedded
Security software